Harden SSLv2-supporting servers against Bleichenbacher's attack.
authorEmilia Kasper <emilia@openssl.org>
Wed, 1 Apr 2015 15:08:45 +0000 (17:08 +0200)
committerEmilia Kasper <emilia@openssl.org>
Wed, 8 Apr 2015 14:42:28 +0000 (16:42 +0200)
commita20db08e77b62ee673e493e9bcbf0cacc5291f68
tree2def98e171a4a2519139e915f6b0a4d0d17636d1
parent9da34ad6cb09e8f57093da5003839894b09fb701
Harden SSLv2-supporting servers against Bleichenbacher's attack.

There is no indication that the timing differences are exploitable in
OpenSSL, and indeed there is some indication (Usenix '14) that they
are too small to be exploitable. Nevertheless, be careful and apply
the same countermeasures as in s3_srvr.c

Thanks to Nimrod Aviram, Sebastian Schinzel and Yuval Shavitt for
reporting this issue.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(cherry picked from commit ae50d8270026edf5b3c7f8aaa0c6677462b33d97)
ssl/s2_srvr.c